SlideShare a Scribd company logo
1 of 6
Five dastardly Distributed Denial
          of Service attacks
While all Internet attacks obviously require a
level of sophistication, in the world of
cyberwarfare the Distributed Denial of
Service (DDoS) attack is one of the most
simple: ping a target with more requests than
it can handle so real users can’t get through.

It can also be effective, which is why DDoS
has become a common form of cyberattack,
now often employed by countries as
cyberware gains state-sponsorship.

Let’s look at some of the more high-profile
DDoS attacks in cyberhistory.                    Image courtesy of rajcreationzs/ FreeDigitalPhotos.net




                By Jeff Jedras
Robert Tappan Morris
While he didn’t set out to do harm, Robert
Tappan Morris may have given birth to the
modern computer virus when he unwittingly
released the first computer worm on the world in
1988 while a student at Cornell University.

His stated goal was to gauge the size of the
Internet, but its self-replicating nature caused it
to disrupt target machines, causing millions of
dollars in damages. He inspired the creation of
the U.S. Computer Emergency Response Team
(CERT), and was the first person charged under
the Computer Fraud and Abuse Act.

While not strictly a DDoS attack, it was an early
precursor. He’s now a professor at MIT.
Iran a target and a combatant
                                                 Iran has been a hotbed of DDoS
                                                 attacks. Or at least suspected ones.
                                                 In late 2011, Bank of America Corp.,
                                                 JPMorgan Chase & Co and Citigroup
                                                 were among a group of U.S.
                                                 companies to have their web sites
                                                 disrupted by attacks – all four are
                                                 involved in enforcing U.S. economic
                                                 sanctions against Iran.
U.S. government officials pointed to Iran, but Iranian officials denied any
involvement.

Iran has also been a target. During the Iranian student uprising in 2009, protest
groups targeted the web site of Iranian president Mahmoud Ahmadinejad,
causing the government to temporarily shut down the Internet.
Who’s bad?
Not all DDoS attacks are
malicious. When Michael Jackson
passed away in 2009, there was a
massive explosion in Internet
searches for information on the
late pop singer. The volume was
so high that search giant Google’s servers became overloaded, and with
millions of searches being conducted, Google thought it was the target of a
DDoS attack.

The symptoms were all there – a massive number of requests pinging Google’s
servers. People searching for Michael Jackson were for a time forced to enter a
captcha to prove their humanity. Eventually, Google put two and two together
and took its DDoS countermeasures offline, declaring a false alarm.
Montreal’s MafiaBoy
 While MafiaBay may be Canada’s entry to the DDoS
 hall of fame, his exploits were certainly global in
 nature.

 In 2000, Montreal teenager Michael Calce
 launched a DDoS attack against large commercial
 sites such as Yahoo, FIFA, Amazon, Dell, E*Trade
 and CNN. The costs of the attack were estimated at
 $7.5 million, and after a joint FBI/RCMP
 investigation, Calce was identified and plead guilty
 to most of the charges he faced.

 He later wrote a book about his experience that
 called for greater Internet security, claiming serious
 vulnerabilities still exist.
Going nuclear: Root nameservers
It would be extremely difficult to pull off, but the
nuclear DDoS attack option would target the 13
Domain Name System root nameserver clusters that
are, essentially, the backbone of the Internet.

 A sustained attack that took enough of them offline
could essentially shut down the entire Internet.

However, the system is built with so much
redundancy that the scale required to launch such
an attack would be massive. Some have tried – a
2002 attempt targeted all 13 servers and only lasted
an hour, while another in 2007 caused performance
issues for four servers that was compensated for by
the others – but no serious attempts have been
                                                       Image courtesy of twobee/ FreeDigitalPhotos.net
made.

More Related Content

Viewers also liked

Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...Ontico
 
Attack detection and prevention in the cyber
Attack detection and prevention in the cyberAttack detection and prevention in the cyber
Attack detection and prevention in the cyberJahangirnagar University
 
TCP connection management in SDN
TCP connection management in SDNTCP connection management in SDN
TCP connection management in SDNChao Chen
 
IBM SoftLayer intro
IBM SoftLayer introIBM SoftLayer intro
IBM SoftLayer introQmo Lin
 
Les professeurs de Télécom ParisTech / Faculty booklet
Les professeurs de Télécom ParisTech / Faculty bookletLes professeurs de Télécom ParisTech / Faculty booklet
Les professeurs de Télécom ParisTech / Faculty bookletTélécom Paris
 
DDoS Attacks and Countermeasures
DDoS Attacks and CountermeasuresDDoS Attacks and Countermeasures
DDoS Attacks and Countermeasuresthaidn
 
运维安全 抵抗黑客攻击_云络安全沙龙4月上海站主题分享
运维安全 抵抗黑客攻击_云络安全沙龙4月上海站主题分享运维安全 抵抗黑客攻击_云络安全沙龙4月上海站主题分享
运维安全 抵抗黑客攻击_云络安全沙龙4月上海站主题分享ChinaNetCloud
 
Ddos presentation
Ddos presentationDdos presentation
Ddos presentationShiela Lm
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments IJITCA Journal
 

Viewers also liked (10)

Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
Tempesta FW - Framework и Firewall для WAF и DDoS mitigation, Александр Крижа...
 
Attack detection and prevention in the cyber
Attack detection and prevention in the cyberAttack detection and prevention in the cyber
Attack detection and prevention in the cyber
 
TCP connection management in SDN
TCP connection management in SDNTCP connection management in SDN
TCP connection management in SDN
 
IBM SoftLayer intro
IBM SoftLayer introIBM SoftLayer intro
IBM SoftLayer intro
 
Les professeurs de Télécom ParisTech / Faculty booklet
Les professeurs de Télécom ParisTech / Faculty bookletLes professeurs de Télécom ParisTech / Faculty booklet
Les professeurs de Télécom ParisTech / Faculty booklet
 
DDoS Attacks and Countermeasures
DDoS Attacks and CountermeasuresDDoS Attacks and Countermeasures
DDoS Attacks and Countermeasures
 
运维安全 抵抗黑客攻击_云络安全沙龙4月上海站主题分享
运维安全 抵抗黑客攻击_云络安全沙龙4月上海站主题分享运维安全 抵抗黑客攻击_云络安全沙龙4月上海站主题分享
运维安全 抵抗黑客攻击_云络安全沙龙4月上海站主题分享
 
Dos ddos
Dos ddosDos ddos
Dos ddos
 
Ddos presentation
Ddos presentationDdos presentation
Ddos presentation
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments
 

More from JeffJedras

Five sci-fi and tech movies to watch this fall
Five sci-fi and tech movies to watch this fallFive sci-fi and tech movies to watch this fall
Five sci-fi and tech movies to watch this fallJeffJedras
 
Five alternatives to Google Glass
Five alternatives to Google GlassFive alternatives to Google Glass
Five alternatives to Google GlassJeffJedras
 
The techie’s summer reading list
The techie’s summer reading listThe techie’s summer reading list
The techie’s summer reading listJeffJedras
 
Social media screw-ups you *must* avoid
Social media screw-ups you *must* avoidSocial media screw-ups you *must* avoid
Social media screw-ups you *must* avoidJeffJedras
 
Five must-have apps for your summer travels
Five must-have apps for your summer travelsFive must-have apps for your summer travels
Five must-have apps for your summer travelsJeffJedras
 
Five embarrassing mobile device thefts
Five embarrassing mobile device theftsFive embarrassing mobile device thefts
Five embarrassing mobile device theftsJeffJedras
 
Five far-out tech office environments
Five far-out tech office environmentsFive far-out tech office environments
Five far-out tech office environmentsJeffJedras
 
Five outrageously expensive mobile phones
Five outrageously expensive mobile phonesFive outrageously expensive mobile phones
Five outrageously expensive mobile phonesJeffJedras
 
Five cool in-car technologies for your summer road trip
Five cool in-car technologies for your summer road tripFive cool in-car technologies for your summer road trip
Five cool in-car technologies for your summer road tripJeffJedras
 
Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)JeffJedras
 
The long, slow, fictional death of the PC
The long, slow, fictional death of the PCThe long, slow, fictional death of the PC
The long, slow, fictional death of the PCJeffJedras
 
Did you know they were Canadian?
Did you know they were Canadian?Did you know they were Canadian?
Did you know they were Canadian?JeffJedras
 
The top tech buzzwords of 2013
The top tech buzzwords of 2013The top tech buzzwords of 2013
The top tech buzzwords of 2013JeffJedras
 
History's most notorious hackers
History's most notorious hackersHistory's most notorious hackers
History's most notorious hackersJeffJedras
 
Top social media hoaxes
Top social media hoaxesTop social media hoaxes
Top social media hoaxesJeffJedras
 
Five innovative laptop concept designs
Five innovative laptop concept designsFive innovative laptop concept designs
Five innovative laptop concept designsJeffJedras
 
Five weird wearable computers
Five weird wearable computersFive weird wearable computers
Five weird wearable computersJeffJedras
 
Worst tech blunders of 2012
Worst tech blunders of 2012Worst tech blunders of 2012
Worst tech blunders of 2012JeffJedras
 
Baby names with a tech twist
Baby names with a tech twistBaby names with a tech twist
Baby names with a tech twistJeffJedras
 
Six unfortunate tech product names
Six unfortunate tech product namesSix unfortunate tech product names
Six unfortunate tech product namesJeffJedras
 

More from JeffJedras (20)

Five sci-fi and tech movies to watch this fall
Five sci-fi and tech movies to watch this fallFive sci-fi and tech movies to watch this fall
Five sci-fi and tech movies to watch this fall
 
Five alternatives to Google Glass
Five alternatives to Google GlassFive alternatives to Google Glass
Five alternatives to Google Glass
 
The techie’s summer reading list
The techie’s summer reading listThe techie’s summer reading list
The techie’s summer reading list
 
Social media screw-ups you *must* avoid
Social media screw-ups you *must* avoidSocial media screw-ups you *must* avoid
Social media screw-ups you *must* avoid
 
Five must-have apps for your summer travels
Five must-have apps for your summer travelsFive must-have apps for your summer travels
Five must-have apps for your summer travels
 
Five embarrassing mobile device thefts
Five embarrassing mobile device theftsFive embarrassing mobile device thefts
Five embarrassing mobile device thefts
 
Five far-out tech office environments
Five far-out tech office environmentsFive far-out tech office environments
Five far-out tech office environments
 
Five outrageously expensive mobile phones
Five outrageously expensive mobile phonesFive outrageously expensive mobile phones
Five outrageously expensive mobile phones
 
Five cool in-car technologies for your summer road trip
Five cool in-car technologies for your summer road tripFive cool in-car technologies for your summer road trip
Five cool in-car technologies for your summer road trip
 
Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)
 
The long, slow, fictional death of the PC
The long, slow, fictional death of the PCThe long, slow, fictional death of the PC
The long, slow, fictional death of the PC
 
Did you know they were Canadian?
Did you know they were Canadian?Did you know they were Canadian?
Did you know they were Canadian?
 
The top tech buzzwords of 2013
The top tech buzzwords of 2013The top tech buzzwords of 2013
The top tech buzzwords of 2013
 
History's most notorious hackers
History's most notorious hackersHistory's most notorious hackers
History's most notorious hackers
 
Top social media hoaxes
Top social media hoaxesTop social media hoaxes
Top social media hoaxes
 
Five innovative laptop concept designs
Five innovative laptop concept designsFive innovative laptop concept designs
Five innovative laptop concept designs
 
Five weird wearable computers
Five weird wearable computersFive weird wearable computers
Five weird wearable computers
 
Worst tech blunders of 2012
Worst tech blunders of 2012Worst tech blunders of 2012
Worst tech blunders of 2012
 
Baby names with a tech twist
Baby names with a tech twistBaby names with a tech twist
Baby names with a tech twist
 
Six unfortunate tech product names
Six unfortunate tech product namesSix unfortunate tech product names
Six unfortunate tech product names
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 

Five Dastardly Distributed Denial of Service Attacks

  • 1. Five dastardly Distributed Denial of Service attacks While all Internet attacks obviously require a level of sophistication, in the world of cyberwarfare the Distributed Denial of Service (DDoS) attack is one of the most simple: ping a target with more requests than it can handle so real users can’t get through. It can also be effective, which is why DDoS has become a common form of cyberattack, now often employed by countries as cyberware gains state-sponsorship. Let’s look at some of the more high-profile DDoS attacks in cyberhistory. Image courtesy of rajcreationzs/ FreeDigitalPhotos.net By Jeff Jedras
  • 2. Robert Tappan Morris While he didn’t set out to do harm, Robert Tappan Morris may have given birth to the modern computer virus when he unwittingly released the first computer worm on the world in 1988 while a student at Cornell University. His stated goal was to gauge the size of the Internet, but its self-replicating nature caused it to disrupt target machines, causing millions of dollars in damages. He inspired the creation of the U.S. Computer Emergency Response Team (CERT), and was the first person charged under the Computer Fraud and Abuse Act. While not strictly a DDoS attack, it was an early precursor. He’s now a professor at MIT.
  • 3. Iran a target and a combatant Iran has been a hotbed of DDoS attacks. Or at least suspected ones. In late 2011, Bank of America Corp., JPMorgan Chase & Co and Citigroup were among a group of U.S. companies to have their web sites disrupted by attacks – all four are involved in enforcing U.S. economic sanctions against Iran. U.S. government officials pointed to Iran, but Iranian officials denied any involvement. Iran has also been a target. During the Iranian student uprising in 2009, protest groups targeted the web site of Iranian president Mahmoud Ahmadinejad, causing the government to temporarily shut down the Internet.
  • 4. Who’s bad? Not all DDoS attacks are malicious. When Michael Jackson passed away in 2009, there was a massive explosion in Internet searches for information on the late pop singer. The volume was so high that search giant Google’s servers became overloaded, and with millions of searches being conducted, Google thought it was the target of a DDoS attack. The symptoms were all there – a massive number of requests pinging Google’s servers. People searching for Michael Jackson were for a time forced to enter a captcha to prove their humanity. Eventually, Google put two and two together and took its DDoS countermeasures offline, declaring a false alarm.
  • 5. Montreal’s MafiaBoy While MafiaBay may be Canada’s entry to the DDoS hall of fame, his exploits were certainly global in nature. In 2000, Montreal teenager Michael Calce launched a DDoS attack against large commercial sites such as Yahoo, FIFA, Amazon, Dell, E*Trade and CNN. The costs of the attack were estimated at $7.5 million, and after a joint FBI/RCMP investigation, Calce was identified and plead guilty to most of the charges he faced. He later wrote a book about his experience that called for greater Internet security, claiming serious vulnerabilities still exist.
  • 6. Going nuclear: Root nameservers It would be extremely difficult to pull off, but the nuclear DDoS attack option would target the 13 Domain Name System root nameserver clusters that are, essentially, the backbone of the Internet. A sustained attack that took enough of them offline could essentially shut down the entire Internet. However, the system is built with so much redundancy that the scale required to launch such an attack would be massive. Some have tried – a 2002 attempt targeted all 13 servers and only lasted an hour, while another in 2007 caused performance issues for four servers that was compensated for by the others – but no serious attempts have been Image courtesy of twobee/ FreeDigitalPhotos.net made.